Analysis

  • max time kernel
    14s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 00:29

General

  • Target

    0897ff53384810f4e68f01bac778bcd7.exe

  • Size

    1.0MB

  • MD5

    0897ff53384810f4e68f01bac778bcd7

  • SHA1

    3e0e20cab5db93d615f1f753a75338440ccffbf6

  • SHA256

    fb90e44b3cee07603ac920b560d1d792346f8e66a3a85ddeda6df64ba25cb832

  • SHA512

    e4b0f107717421d78fb7cfa87a881ed1d3a5d458926dc1897b747b10177acb6ef89ee576da59c03225e4361fe7324ab0ad0f46dd265abb92a0c93a9ccd4962a4

  • SSDEEP

    24576:9ht/BcMXmE5ZIFQL/Qcpi7UOOrqTlHCRifwzBbUY:9jB9WPFQLIdg1olVfwzBX

Score
10/10

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0897ff53384810f4e68f01bac778bcd7.exe
    "C:\Users\Admin\AppData\Local\Temp\0897ff53384810f4e68f01bac778bcd7.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2576-0-0x000002C892690000-0x000002C8927A6000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-1-0x00007FFCA0ED0000-0x00007FFCA1991000-memory.dmp

    Filesize

    10.8MB

  • memory/2576-2-0x000002C8ACBC0000-0x000002C8ACC7E000-memory.dmp

    Filesize

    760KB

  • memory/2576-3-0x000002C8ACD20000-0x000002C8ACD30000-memory.dmp

    Filesize

    64KB

  • memory/2576-4-0x000002C8AD0F0000-0x000002C8AD166000-memory.dmp

    Filesize

    472KB

  • memory/2576-35-0x00007FFCA0ED0000-0x00007FFCA1991000-memory.dmp

    Filesize

    10.8MB